Proceedings of the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems 2005
DOI: 10.1145/1082473.1082528
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized voting with unconditional privacy

Abstract: The aggregation of conflicting preferences is a key issue in multiagent systems. Due to its universality, voting has a central role among preference aggregation mechanisms. Voting among a set of alternatives can be used for such diverse tasks as choosing a joint plan in a multiagent system, determining a leader in a group of humans or agents, or voting among different resource or task allocations. Maintaining privacy of individuals' votes is crucial in order to guarantee freedom of choice (e.g., lack of vote c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 26 publications
(20 reference statements)
0
2
0
Order By: Relevance
“…It is quite natural to consider Combinatorial Shift Bribery also from a different perspective. Instead of asking what happens for a small number of candidates, we might ask about the complexity of Combinatorial Shift Bribery for a small number of voters (see, for example, Brandt, Harrenstein, Kardel, & Seedig, 2013;Chen et al, 2015, for some motivation as to why looking at elections with few voters is interesting). In this case we obtain hardness only for the Borda rule.…”
Section: Results For Shift Actions With Unit Effect On Two Votersmentioning
confidence: 99%
“…It is quite natural to consider Combinatorial Shift Bribery also from a different perspective. Instead of asking what happens for a small number of candidates, we might ask about the complexity of Combinatorial Shift Bribery for a small number of voters (see, for example, Brandt, Harrenstein, Kardel, & Seedig, 2013;Chen et al, 2015, for some motivation as to why looking at elections with few voters is interesting). In this case we obtain hardness only for the Borda rule.…”
Section: Results For Shift Actions With Unit Effect On Two Votersmentioning
confidence: 99%
“…The consequence is that a group of n-1 colluders that includes the winner can uncover the global function. Let us note that as stated by Brandt and Sandholm (2004), it is impossible to find a completely private mechanism to perform the Vickrey auction. So, providing a mechanism where even the collusion of n-1 bidders is unable to breach the privacy is not possible.…”
Section: Figure 1 Example Of Auctionmentioning
confidence: 99%
“…Besides, we show that other collusion threats may appear by chance, though the probability of these situations decreases with the number of bidders. As it is stated in Brandt and Sandholm (2004), it is impossible to find a completely private mechanism to perform the Vickrey auction. This result imposes an upper bound of privacy-preserving efficiency in that framework.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, in score-based voting rules, a score for each candidate is computed subject to the specifications of the underlying voting rule, and then the winning candidate is the one whose aggregated score is highest. In this study we focus on order-based (a.k.a pairwise-comparison) voting rules, where the relative order of the candidates is considered by the underlying voting rule [7].…”
Section: Introductionmentioning
confidence: 99%